{"id":"CVE-2026-27140","summary":"Code execution vulnerability in SWIG code generation in cmd/go","details":"SWIG file names containing 'cgo' and well-crafted payloads could lead to code smuggling and arbitrary code execution at build time due to trust layer bypass.","aliases":["BIT-golang-2026-27140","GO-2026-4871"],"modified":"2026-05-15T04:14:30.894672928Z","published":"2026-04-08T01:06:57.893Z","related":["CGA-7mq7-fv93-8q6v","SUSE-SU-2026:1320-1","SUSE-SU-2026:1321-1","SUSE-SU-2026:1580-1","SUSE-SU-2026:1581-1","SUSE-SU-2026:21355-1","SUSE-SU-2026:21356-1","openSUSE-SU-2026:10514-1","openSUSE-SU-2026:10525-1","openSUSE-SU-2026:10673-1","openSUSE-SU-2026:20570-1","openSUSE-SU-2026:20571-1","openSUSE-SU-2026:20703-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"fixed":"1.25.9"},{"introduced":"1.26.0-0"},{"fixed":"1.26.2"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27140.json","cna_assigner":"Go"},"references":[{"type":"WEB","url":"https://go.dev/cl/763768"},{"type":"WEB","url":"https://go.dev/issue/78335"},{"type":"WEB","url":"https://groups.google.com/g/golang-announce/c/0uYbvbPZRWU"},{"type":"WEB","url":"https://pkg.go.dev"},{"type":"WEB","url":"https://pkg.go.dev/vuln/GO-2026-4871"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27140.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27140"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}